TY - GEN
T1 - A practical and provably secure coalition-resistant group signature scheme
AU - Ateniese, Giuseppe
AU - Camenisch, Jan
AU - Joye, Marc
AU - Tsudik, Gene
N1 - Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 2000.
PY - 2000
Y1 - 2000
N2 - A group signature scheme allows a group member to sign messages anonymously on behalf of the group. However, in the case of a dispute, the identity of a signature’s originator can be revealed (only) by a designated entity. The interactive counterparts of group signatures are identity escrow schemes or group identification scheme with revocable anonymity. This work introduces a new provably secure group signature and a companion identity escrow scheme that are significantly more efficient than the state of the art. In its interactive, identity escrow form, our scheme is proven secure and coalition-resistant under the strong RSA and the decisional Diffie-Hellman assumptions. The security of the noninteractive variant, i.e., the group signature scheme, relies additionally on the Fiat-Shamir heuristic (also known as the random oracle model).
AB - A group signature scheme allows a group member to sign messages anonymously on behalf of the group. However, in the case of a dispute, the identity of a signature’s originator can be revealed (only) by a designated entity. The interactive counterparts of group signatures are identity escrow schemes or group identification scheme with revocable anonymity. This work introduces a new provably secure group signature and a companion identity escrow scheme that are significantly more efficient than the state of the art. In its interactive, identity escrow form, our scheme is proven secure and coalition-resistant under the strong RSA and the decisional Diffie-Hellman assumptions. The security of the noninteractive variant, i.e., the group signature scheme, relies additionally on the Fiat-Shamir heuristic (also known as the random oracle model).
KW - Coalitionresistance
KW - Group signature schemes
KW - Identity escrow
KW - Provable security
KW - Revocable anonymity
KW - Strong RSA assumption
UR - http://www.scopus.com/inward/record.url?scp=84921018856&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84921018856&partnerID=8YFLogxK
U2 - 10.1007/3-540-44598-6_16
DO - 10.1007/3-540-44598-6_16
M3 - Conference contribution
AN - SCOPUS:84921018856
SN - 9783540445982
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 255
EP - 270
BT - Advances in Cryptology - CRYPTO 2000 - 20th Annual International Cryptology Conference, Proceedings
A2 - Bellare, Mihir
T2 - 20th Annual International Cryptology Conference, CRYPTO 2000
Y2 - 20 August 2000 through 24 August 2000
ER -